News, Announcements, Tech Discussions
‘Tis the Season – 12 Days of Gifts!12 Days of Gifts
Everyone loves gifts for the holidays. And Webroot and Carbonite customers are no different! We’re giving away a new gift every day during our special 12 Days of Gifts holiday promotion. All you have to do is follow, reply, share, retweet, like or sign up for a new account and you’ll be automatically entered.Here’s what we’re giving away: 12 Days Of Gifts:Day 1: Set of 4 figurines and group buttonDay 2: Notebook and penDay 3: Tote bag and padfolioDay 4: Lunch bagDay 5: Glass cleaner and webcam coverDay 6: SocksDay 7: Power bank and PopSocketDay 8: Tech pouchDay 9: Sticky notes and fidget spinner penDay 10: Hand sanitizerDay 11: Special edition gold MalwareWolf + buttonDay 12: Set of 4 figurines and group button To be eligible to enter all you have to do is:Sign up for a Webroot Community account. Leave a relevant comment about the subject matter to the “12 Days of Gifts” article (comment below) on the Community; or Leave a relevant comment about the subject matter to the Modular Malwa
Congratulations to our first Gold VIP TripleHelix
We knew it was getting close but we didn't know today would be the day. Congratulations TripleHelix - you are a legend on the Webroot community! Woohoo!!! Edit: I mentioned that we had a few surprises lined up to recognize the occasion and here they are: 1. Your Gold VIP jacket is on the way to you 2. We're naming a conference room on the 6th floor after you - it will be the TripleHelix conference room. The building should be done around October, and I'll post photos when we have it ready 3. We got together and made a video to express our appreciation for all that you've done for Webroot and the community: [video]https://www.youtube.com/watch?v=jTfLPsAO1Ic[/video]
Sony Pictures corporate network compromised by a major attack
Editor's note: See the latest on Sony pulling the movie The Interview [url=https://community.webroot.com/t5/Security-Industry-News/Sony-Pictures-corporate-network-compromised-by-a-major-attack/m-p/177449#M11178]here[/url]. by Pierluigi Paganini on November 24th, 2014 [h2]The Sony Pictures corporate network was targeted by a major cyber attack that has brought off-line every computer within the company.[/h2]The corporate network of Sony Pictures is reportedly breached and taken offline, the news was published on [url=http://thenextweb.com/]TheNextWeb[/url] website. Sony Pictures manages distribution of the Sony film and TV productions. The attackers breached the service this morning, meanwhile [url=http://www.reddit.com/r/hacking/comments/2n9zhv/i_used_to_work_for_sony_pictures_my_friend_still/]a thread started on [/url][url=http://www.reddit.com/r/hacking/comments/2n9zhv/i_used_to_work_for_sony_pictures_my_friend_still/]Reddit[/url] social news we
Let's play a little game.
[b]RULES Person 1 starts with a word and Person 2 makes another word that starts with the last letter of the first word, for example: Person 1: Hello Person 2: Organic Person 3: Car If you are really really stuck then you can make a word starting with the first letter of the previous word, for example: Person 1: Anthrax Person 2: (I'm too stupid to come up with a word that starts with X) Armadillo[/b] --- No NOs No repeated words on the same thread page - Example: Two "elevate" replies on the same page No proper nouns - Example: John, Nissan No made up words (this also includes words that are meant to be separated but have their space removed) - Example: idunno, jackwad, pwned No slang or derogative words - Example: Well, you don't need any examples for this one... And remember, forum rules apply and have fun! First word: Magazine
Microsoft accused of Windows 10 upgrade 'nasty trick'
By Zoe Kleinman Technology reporter, BBC News "Microsoft has faced criticism for changing the pop-up box encouraging Windows users to upgrade to Windows 10. Clicking the red cross on the right hand corner of the pop-up box now activates the upgrade instead of closing the box. And this has caused confusion as typically clicking a red cross closes a pop-up notification" [url=http://www.bbc.co.uk/news/technology-36367221]Microsoft accused of Windows 10 upgrade 'nasty trick' - BBC News[/url] Couldn't see this story posted (in another thread)? The tactics that Microsoft is using to spread Windows10 are becoming more and more unacceptable IMHO. :( :@ Ghacks: [url=http://www.ghacks.net/2016/05/25/get-windows-10-malware/]Get Windows 10 has the characteristics of malware - gHacks Tech News[/url]
Control Panel will be phased out in Windows 10
[b]October 9, 2015 By Arun Kumar [/b] The [b]Control Panel[/b] had been an integral part of Windows since the beginning and helped in tweaking and customizing the operating system. In a tweet by Gabriel Aul, the chief of Windows Insider Program, he said that Control Panel will be removed from Windows 10 in coming days. [img]http://news.thewindowsclub.com/wp-content/uploads/2015/10/PC-Settings-in-Windows-10-400x299.png[/img] [url=http://news.thewindowsclub.com/control-panel-will-phased-windows-10-80386/]Full Article[/url]
I didn't know where this would be appropriate, but a mod can move this post, if they like... But, this is mystery to me, that when logged in you can check how long you have been logged, it can show the number of minutes one is idle. But, for me I can never achieve this feat. ;) How does one get to show up as being idle? I have a screenshot showing what I mean, but as per usual I can't get it to show, here.
I had a really bad virus and malware attack last week. Webroot ran numerous scans, but I still could not access my hotmail account through my ie. Finally had to call Microsoft and pay $100 to have my laptop disinfected. Would there have been a better way? Microsoft found 1280 PUPs even after Webroot had pronounced my computer free of threats.
Health Insurer Anthem Hit by Hackers
Anthem Inc., the country’s (USA) second-biggest health insurer, said hackers broke into a database containing personal information for about 80 million of its customers and employees in what is likely to be the largest data breach disclosed by a health-care company. Investigators are still determining the extent of the incursion, which was discovered last week, and Anthem said it is likely that “tens of millions” of records were stolen. The health insurer said the breach exposed names, birthdays, addresses and Social Security numbers but doesn’t appear to involve medical information or financial details such as credit-card or bank-account numbers, nor are there signs the data are being sold on the black market. Anthem, which offers Blue Cross Blue Shield plans in California, New York and other states, said it doesn’t know precisely how many people may be affected. So far, it appears that the attack detected last week is the only breach of Anthem’s systems, and it isn’t yet clear how
Data Disasters - Fool Me Once (and hopefully never again)Blog
World Backup Day is March 31stWe love using this time to reflect on our habits around data - both personal and professional. There is a very common belief out there that can be summed up as “My data is safe - I don’t think I need to worry much about backing it up.” This belief is held by the tech-illiterate as well as self-described tech “pros” across the world. And even if they don’t have this belief, per se, there is a trend of people putting data backup at the end of their to-do list. Getting an antivirus solution, a VPN, or shiny new hardware tends to feel more important to most people in regards to their technical “must acquire” list. If there’s one idea I want you to start believing today, it is the following: Incorporating an automated Data Backup plan is one of the most important actions you can take to save yourself time, energy, and frustration. World Backup Day serves as a useful reminder for all of the things that can go wrong with your data:A hard drive can reach the end o
Wait a Minute, the Community Looks Different!
Hello Everyone! You may notice that the Webroot Community looks different today, as we have rolled out the first of several improvements. The most immediate changes you’ll see are updates to the overall look and feel of the community. This cleaner and more modern design update ties into the overall aesthetic that you’ve come to know on our main site, Webroot.com. I think where you’ll notice the biggest change is on the homepage: [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/30702iB7E4B2E7D65FA43C.png[/img] [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/30703iBA45A56AFC1C5E3C.png[/img] Here are some of the other changes we’ve made: [list] [*]Moved to a responsive design – the page will adjust when viewed on smaller screens [*]Updated header with clearer links instead of icons [*]Updated font and colors to match the webroot.com site [*]Added a search bar at the top of the page[/list] We are constantly striving to make
Spooktober Community Contest 2022Contest
To Kick off Nastiest Malware 2022 proper and to show our appreciation to this community over the many years we’re going to make this Halloween extra special. The next 4 weeks we’re giving away lots of PRIZES for just being an active member of the community and dominating the leaderboard… We’re also giving away raffle prizes to random commenters in certain topics (hint: one of them is this post). WEEKLY WINNERS ANNOUNCED Who’s ready to win some prizes? How do I win? You can win in a number of ways, but the most common is going to be points system on our leaderboardThe easiest way to top the leaderboard is being an active member on the community - make relevant posts, start discussions, answer questions that are posted by other members, and receiving likesWe have temporarily removed the ability to receive points for giving a like due to gaming of the system - only receiving likes will earn points Being a helpful member of our community will provide you with a chance to win our bigges
AV-Comparatives and Our Unique Approach
Today, the most recent [url=http://www.av-comparatives.org/comparativesreviews/detection-test/238-file-detection-test-october-2012]AV-Comparatives File Detection report [/url]was released. While the results were disappointing to see on paper, they were not surprising to those of us on the Webroot team. To help clear up any confusion, we’d like to again share our thoughts on why our approach is difficult to compare in reports like this. The latest AV-Comparatives report is an on-demand detection test of a specific set of files that evaluates whether or not a particular security solution has a signature for those files. Signature-based detection is [b]not[/b] the only measure of a solution’s efficacy in protecting a user from threats, however. While Webroot’s [url=http://www.webroot.com/En_US/consumer-products-secureanywhere-antivirus.html]SecureAnywhere[/url] solution does leverage signature files in the cloud as part of its detection capabilities, those are not the primary security
Hey did you notice anything different with the home page recently?Giveaway!
OpenText has some new branding with the new acquisition of Microfocus! All of the security products for OpenText are now going to be branded as OpenText Cybersecurity Here are all the OpenText brands in this Cybersecurity divisionNotice that Webroot still keeps the green 🤗 What this means is that we have a whole bunch of OLD BRANDED SWAG that we need to give away to make room for the newly minted SWAG that we’ll be ordering. Dang that cowbell just wont quitWe have a lovely bundle of gifts to giveaway. Included in this SWAG BAG is:Socks Light up Chat Bubble Cowbell Pens BBQ Tool Apple-Scented Notebook Lowball YETI mug The first 30 people reply to this thread with “OpenText is Cybersecurity” I will DM you and get this shipped to you! (US, UK, CA only) I’m all about that apple-scented notebook
IoT in the Cybersecurity Landscape: Convenience vs SecurityBlog
The Internet of Things (IoT) has revolutionized how we interact with our surroundings, making life more convenient and efficient. IoT devices connect everyday objects to the internet, allowing us to control our homes, monitor our health, and even track our belongings. However, this interconnectivity comes at a cost: the exponential growth of IoT devices has led to increased cybersecurity risks. In this article, we will discuss trends in IoT and their implications on the cybersecurity landscape, and ponder whether the convenience provided by IoT is worth the security trade-offs. The concept of IoT can be traced back to the 1980s, but it wasn't until the early 2000s that IoT devices began to gain widespread adoption. In the early days of IoT, security was often an afterthought and the focus was on getting a working product out the door. However, as IoT devices have proliferated, the risks associated with their widespread use have become more apparent.I was at a Defcon event about a decad
Hillary Clinton used personal email for government business, putting security at risk
[b]By [url=http://www.welivesecurity.com/author/gcluley/]Graham Cluley[/url] posted 3 Mar 2015[/b] [i]The New York Times[/i] has [url=http://www.nytimes.com/2015/03/03/us/politics/hillary-clintons-use-of-private-email-at-state-department-raises-flags.html]published[/url] claims that Hillary Clinton did not have a government email address throughout her four-year tenure at the US State Department, but instead used a personal email address. The use of a private email account is likely to get Clinton, who is widely tipped to be the next Democratic presidential candidate, into some hot water. Firstly, federal regulations require that emails sent and received by officials – such as the secretary of state – are government records that must be retained. With the exception of certain classified, personal and sensitive content, records are kept for congressional committees, historians and the news media. [url=http://www.welivesecurity.com/2015/03/03/hillary-clinton-p
Hackers compromised free CCleaner software
Hackers broke into British company Piriform’s free software for optimizing computer performance last month potentially allowing them to control the devices of more than two million users, the company and independent researchers said on Monday. The malicious program was slipped into legitimate software called CCleaner, which is downloaded for personal computers and Android phones as often as five million times a week. It cleans up junk programs and advertising cookies to speed up devices. CCleaner is the main product made by London’s Piriform, which was bought in July by Prague-based Avast, one of the world’s largest computer security vendors. At the time of the acquisition, the company said 130 million people used CCleaner. [url=http://www.reuters.com/article/us-security-avast/hackers-compromised-free-ccleaner-software-avasts-piriform-says-idUSKCN1BT0R9]Full Article[/url]
The Next Generation of Webroot SecureAnywhere is Here
At Webroot, we continually strive for excellence. We're very excited to unveil our latest improvements to SecureAnywhere: [list] [*]New interface that's even easier to use [*]Features and protection information at your fingertips [*]Set it and forget it – continuous protection without interruptions or slowdowns [*]Stronger identity protection with real-time anti-phishing to block fake websites that trick you into entering your personal information [*]A seamless update process – product improvements are continually added in the background, with no action required[/list]For a quick recap of what's changed, please take a look at this video, featuring [user=212][/user], our lead developer: [img]https://community.webroot.com/html/js/lib/tinymce/3.5.4/themes/advanced/img/trans.gif[/img] Additional screenshots and explanations are available on [url=http://www.webroot.com/us/en/support/ui-feature-updates]this page[/url]. So, what are your initial thoughts?&nb
World Password DayBlog
Today is World Password Day and we wanted to take that opportunity to have a discussion with our community about “Password Integrity”. With every passing year, it seems like we need five more accounts for our business and personal lives. That means five new passwords and five new opportunities for someone to access your information or steal your identity. On top of all that, how many of you can honestly say you use a unique password for every one of your ever-growing list of online logins?The truth is, it has become nearly impossible to create and remember long, secure passwords for all of our online accounts. The solution that most people have begun to adopt is the use of a password manager such as LastPass which is included in SecureAnywhere Internet Security Plus and Complete. Using a password manager solves a number of problems such as:Generating randomized, secure passwords Locks your huge list of account passwords behind a singular “master password” or biometric password such as
WSA version 18.104.22.168 officially compatible with Windows 10
We've received word from Microsoft that WSA version 22.214.171.124 has received approval to be officially compatible with Windows 10. That means that there shouldn't be any more Program Compatibility Assistant warnings when upgrading or installing on Windows 10. We won't support WSA on Windows 10 until the release date, but for those of you on the Windows 10 beta, please let us know on the community if you run into any issues. The WSA 126.96.36.199 update is a rolling update - if you haven't received the update by the time you plan on upgrading to Windows 10, then you can force an update by right-clicking on the system tray Webroot icon and selecting "Check for updates".
Beta testers wanted - 2017
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/30259i69B1E204ABE8A73D.png[/img] Calling all cutting edge Webroot technophiles! We're looking to grow our current beta program. It doesn't matter if you're a PC or Mac enthusiast. [b]All are welcome to join![/b] If you're interested in helping us test out new builds for bugs and issues, please PM me or [user=43033][/user] or request access to the group [url=https://community.webroot.com/t5/PC-Beta/gp-p/PC_Beta]here[/url]. How does it work you ask? Great question! [b][u]New Tester:[/u][/b] [list] [*]We will send you a private message with a keycode and installation information [*]Testers provide product feedback via the [url=https://community.webroot.com/t5/Beta/Webroot-SecuryAnywhere-Mac-Beta-Update-9-0-4-23/gpm-p/293216]Community Beta Group[/url] [*]General feedback to let us know if Webroot is working as designed [*]Specific feedback to a
Announcing Windows 10 Insider Preview Build 18351 Fast Ring
March 5, 2019 10:02 am By [url=https://blogs.windows.com/windowsexperience/author/dona-sarkar/]Dona Sarkar[/url] and [url=https://blogs.windows.com/windowsexperience/author/brandonleblanc/]Brandon LeBlanc[/url] Hello Windows Insiders, today we are releasing Windows 10 Insider Preview [b]Build 18351 (19H1)[/b] to Windows Insiders in the Fast ring. If you are looking for a complete look at what build is in which Insider ring – head on over to [url=https://aka.ms/flighthub]Flight Hub[/url]. You can also check out the [url=https://aka.ms/wip-docs]rest of our documentation here[/url] including a complete list of new features and updates that have gone out as part of Insider flights for the current development cycle (which currently is 19H1). [h1][b]General changes, improvements, and fixes for PC[/b][/h1][list] [*]If you haven’t been able to get the game [i]State of Decay[/i] for free (for a limited time), we’ve just made more slots available! Whether you’ve tried it in earlier builds
Join the Conversation
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.